qemu-kvm-block-ssh-15:6.0.0-33.el8s >  H awD z뾂al92?𶭉ænu04>[oX7O*!f5Jߩ^%, z'7v mgSڞI$B*Mc0lw-(GBm٘=+[AVB[)4 4œ?Dّb jľ@+4L2`MCݗ0/)0rM%+1bSu N7Tx * Y>|D[ "d "sMeBOf841c96e08e511b491fc6624e565d95c04a2c0f86fa984ea9f58542f957b94b8c829c69b0c3637d7513af9425fbbad086f17da6far$awD z뾂alBYTcW{ R!_#|=9_⚓ĹjϨgшK[t4VRP!6#M64 yւh+b 75Ē$BHl);\ X*+u~`n|;!t2 A:sPL՚=~OPJG̺a-'2AYF} LߝG_mg 0$Ulx#pԩO .m,"mpf?s~n_VfMޖ# N|Y|3'>p=>?>d$ ( > - BTiox     ,@Tt  C (x89:G;LH;\I;lX;pY;x\;];^;b<7d=ce=hf=kl=mt=u=v=w>Hx>Xy>h>>>>Cqemu-kvm-block-ssh6.0.033.el8sQEMU SSH block driverThis package provides the additional SSH block driver for QEMU. Install this package if you want to access remote disks using the Secure Shell (SSH) protocol.arǥaarch64-03.rdu2.centos.orgCentOSCentOSGPLv2 and GPLv2+ and CC-BYCBS Development/Toolshttp://www.qemu.org/linuxaarch64+AAarLJarLJarLJarñccfe5716547b02f9c7cc5582c9e273e37e1cfeff02133fcd3788b1d764616ed5../../../../usr/lib64/qemu-kvm/block-ssh.sorootrootrootrootrootrootrootrootqemu-kvm-6.0.0-33.el8s.src.rpmqemu-kvm-block-sshqemu-kvm-block-ssh(aarch-64)@@@@@@@    @ld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libssh.so.4()(64bit)libssh.so.4(LIBSSH_4_5_0)(64bit)libssh.so.4(LIBSSH_4_7_0)(64bit)qemu-kvm-common(aarch-64)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rtld(GNU_HASH)15:6.0.0-33.el8s3.0.4-14.6.0-14.0-15.2-14.14.3aqV@aexaTU@a?=@a&0a@a @a@``t```"@`@`P@`!@``Jon Maloy - 6.0.0-33.el8_5Jon Maloy - 6.0.0-32Jon Maloy - 6.0.0-31Danilo Cesar Lemes de Paula - 6.0.0-30Danilo Cesar Lemes de Paula - 6.0.0-29.el8Danilo Cesar Lemes de Paula - 6.0.0-28.el8Miroslav Rezanina - 6.0.0-27Miroslav Rezanina - 6.0.0-26Danilo Cesar Lemes de Paula - 6.0.0-25.el8Danilo Cesar Lemes de Paula - 6.0.0-24.el8Danilo Cesar Lemes de Paula - 6.0.0-23.el8Danilo Cesar Lemes de Paula - 6.0.0-22.el8Danilo Cesar Lemes de Paula - 6.0.0-21.el8Danilo Cesar Lemes de Paula - 6.0.0-20.el8Danilo Cesar Lemes de Paula - 6.0.0-19.el8Danilo Cesar Lemes de Paula - 6.0.0-18.el8Danilo Cesar Lemes de Paula - 6.0.0-17.el8Danilo Cesar Lemes de Paula - 6.0.0-16.el8- kvm-Fix-virtio-net-pci-vectors-compat.patch [bz#1999141] - Resolves: bz#1999141 (migration fails with: "qemu-kvm: get_pci_config_device: Bad config data: i=0x9a read: 3 device: 2 cmask: ff wmask: 0 w1cmask:0")- kvm-virtio-balloon-Fix-page-poison-subsection-name.patch [bz#2004535] - kvm-virtio-net-fix-use-after-unmap-free-for-sg.patch [bz#1999224] - Resolves: bz#2004535 (fails to revert snapshot of a VM [balloon/page-poison]) - Resolves: bz#1999224 (CVE-2021-3748 virt:av/qemu-kvm: QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu [rhel-av-8])- kvm-virtiofsd-Fix-fuse-setxattr-API-change-issue.patch [bz#1990697] - Resolves: bz#1990697 (virtiofsd: xattr remapping does not seem to work as expected)- kvm-usbredir-fix-free-call.patch [bz#1989928] - kvm-block-Fix-in_flight-leak-in-request-padding-error-pa.patch [bz#2002631] - Resolves: bz#1989928 (CVE-2021-3682 virt:av/qemu-kvm: QEMU: usbredir: free call on invalid pointer in bufp_alloc() [rhel-av-8.5.0]) - Resolves: bz#2002631 (Windows Installation blocked on 4k disk when using blk+raw+iothread)- kvm-file-posix-Cap-max_iov-at-IOV_MAX.patch [bz#1994494] - kvm-migration-Move-yank-outside-qemu_start_incoming_migr.patch [bz#1974366] - Resolves: bz#1994494 (VM remains in paused state when trying to write on a resized disk resides on iscsi) - Resolves: bz#1974366 (Fail to set migrate incoming for 2nd time after the first time failed)- kvm-iotests-Improve-and-rename-test-291-to-qemu-img-bitm.patch [bz#1946084] - kvm-qemu-img-Fail-fast-on-convert-bitmaps-with-inconsist.patch [bz#1946084] - kvm-qemu-img-Add-skip-broken-bitmaps-for-convert-bitmaps.patch [bz#1946084] - kvm-audio-Never-send-migration-section.patch [bz#1991671] - Resolves: bz#1946084 (qemu-img convert --bitmaps fail if a bitmap is inconsistent) - Resolves: bz#1991671 (vmstate differs between -audiodev and QEMU_AUDIO_DRV when no sound frontends devs present.)- kvm-migration-move-wait-unplug-loop-to-its-own-function.patch [bz#1976852] - kvm-migration-failover-continue-to-wait-card-unplug-on-e.patch [bz#1976852] - kvm-aarch64-Add-USB-storage-devices.patch [bz#1974579] - Resolves: bz#1976852 ([failover vf migration] The failover vf will be unregistered if canceling the migration whose status is "wait-unplug") - Resolves: bz#1974579 (It's not possible to start installation from a virtual USB device on aarch64)- kvm-acpi-pc-revert-back-to-v5.2-PCI-slot-enumeration.patch [bz#1977798] - kvm-migration-failover-reset-partially_hotplugged.patch [bz#1787194] - kvm-hmp-Fix-loadvm-to-resume-the-VM-on-success-instead-o.patch [bz#1959676] - kvm-migration-Move-bitmap_mutex-out-of-migration_bitmap_.patch [bz#1959729] - kvm-i386-cpu-Expose-AVX_VNNI-instruction-to-guest.patch [bz#1924822] - kvm-ratelimit-protect-with-a-mutex.patch [bz#1838221] - kvm-Update-Linux-headers-to-5.13-rc4.patch [bz#1838221] - kvm-i386-Add-ratelimit-for-bus-locks-acquired-in-guest.patch [bz#1838221] - kvm-iothread-generalize-iothread_set_param-iothread_get_.patch [bz#1930286] - kvm-iothread-add-aio-max-batch-parameter.patch [bz#1930286] - kvm-linux-aio-limit-the-batch-size-using-aio-max-batch-p.patch [bz#1930286] - kvm-block-nvme-Fix-VFIO_MAP_DMA-failed-No-space-left-on-.patch [bz#1848881] - Resolves: bz#1977798 (RHEL8.5 guest network interface name changed after upgrade to qemu-6.0) - Resolves: bz#1787194 (After canceling the migration of a vm with VF which enables failover, using "migrate -d tcp:invalid uri" to re-migrating the vm will cause the VF in vm to be hot-unplug.) - Resolves: bz#1959676 (guest status is paused after loadvm on rhel8.5.0) - Resolves: bz#1959729 (SAP/3TB VM migration slowness [idle db]) - Resolves: bz#1924822 ([Intel 8.5 FEAT] qemu-kvm AVX2 VNNI - Fast Train) - Resolves: bz#1838221 ([Intel 8.5 FEAT] qemu-kvm Bus Lock VM Exit - Fast Train) - Resolves: bz#1930286 (randread and randrw regression with virtio-blk multi-queue) - Resolves: bz#1848881 (nvme:// block driver can exhaust IOMMU DMAs, hanging the VM, possible data loss)- kvm-s390x-cpumodel-add-3931-and-3932.patch [bz#1976171] - kvm-file-posix-fix-max_iov-for-dev-sg-devices.patch [bz#1943653] - kvm-scsi-generic-pass-max_segments-via-max_iov-field-in-.patch [bz#1943653] - kvm-osdep-provide-ROUND_DOWN-macro.patch [bz#1943653] - kvm-block-backend-align-max_transfer-to-request-alignmen.patch [bz#1943653] - kvm-block-add-max_hw_transfer-to-BlockLimits.patch [bz#1943653] - kvm-file-posix-try-BLKSECTGET-on-block-devices-too-do-no.patch [bz#1943653] - Resolves: bz#1976171 ([IBM 8.5 FEAT] CPU Model for new IBM Z Hardware - qemu part) - Resolves: bz#1943653 (RHV VM pauses due to 'qemu-kvm' getting EINVAL on i/o to a direct lun with scsi passthrough enabled)- kvm-s390x-css-Introduce-an-ESW-struct.patch [bz#1968326] - kvm-s390x-css-Split-out-the-IRB-sense-data.patch [bz#1968326] - kvm-s390x-css-Refactor-IRB-construction.patch [bz#1968326] - kvm-s390x-css-Add-passthrough-IRB.patch [bz#1968326] - kvm-vhost-user-blk-Fail-gracefully-on-too-large-queue-si.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Make-sure-to-set-Error-on-realize-fai.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Don-t-reconnect-during-initialisation.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Improve-error-reporting-in-realize.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Get-more-feature-flags-from-vhost-dev.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-virtio-Fail-if-iommu_platform-is-requested-but-unsup.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Check-that-num-queues-is-supported-by.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-Fix-backends-without-multiqueue-support.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - Resolves: bz#1968326 ([vfio_ccw] I/O error when checking format - dasdfmt requires --force in quick mode when passed through) - Resolves: bz#1935014 (qemu crash when attach vhost-user-blk-pci with option queue-size=4096) - Resolves: bz#1935019 (qemu guest failed boot when attach vhost-user-blk-pci with option iommu_platform=on) - Resolves: bz#1935020 (qemu guest failed boot when attach vhost-user-blk-pci with option packed=on) - Resolves: bz#1935031 (qemu guest failed boot when attach vhost-user-blk-pci with unmatched num-queues with qsd)- kvm-Add-mtod_check.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-limit-vendor-specific-area-to-input-packet-mem.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-check-bootp_input-buffer-size.patch [bz#1970823] - kvm-upd6-check-udp6_input-buffer-size.patch [bz#1970842] - kvm-tftp-check-tftp_input-buffer-size.patch [bz#1970850] - kvm-tftp-introduce-a-header-structure.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-udp-check-upd_input-buffer-size.patch [bz#1970858] - kvm-Fix-DHCP-broken-in-libslirp-v4.6.0.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-redhat-use-the-standard-vhost-user-JSON-path.patch [bz#1804196] - Resolves: bz#1970823 (CVE-2021-3592 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-av-8]) - Resolves: bz#1970842 (CVE-2021-3593 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-av-8]) - Resolves: bz#1970850 (CVE-2021-3595 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-av-8]) - Resolves: bz#1970858 (CVE-2021-3594 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-av-8]) - Resolves: bz#1804196 (inconsistent paths for interop json files)- kvm-redhat-Expose-upstream-machines-pc-4.2-and-pc-2.11.patch [bz#1897923] - kvm-redhat-Enable-FDC-device-for-upstream-machines-too.patch [bz#1897923] - kvm-redhat-Add-hw_compat_4_2_extra-and-apply-to-upstream.patch [bz#1897923] - kvm-ppc-pef.c-initialize-cgs-ready-in-kvmppc_svm_init.patch [bz#1789757] - kvm-virtio-gpu-handle-partial-maps-properly.patch [bz#1932279] - kvm-redhat-Fix-unversioned-Obsoletes-warning.patch [bz#1950405 bz#1967330] - kvm-redhat-Move-qemu-kvm-docs-dependency-to-qemu-kvm.patch [bz#1950405 bz#1967330] - kvm-redhat-introducting-qemu-kvm-hw-usbredir.patch [bz#1950405 bz#1967330] - kvm-spapr-Fix-EEH-capability-issue-on-KVM-guest-for-PCI-.patch [bz#1976015] - Resolves: bz#1897923 (support Live Migration from Ubuntu 18.04 i440fx to RHEL) - Resolves: bz#1789757 ([IBM 8.5 FEAT] Add machine option to enable secure VM support) - Resolves: bz#1932279 ([aarch64] qemu core dumped when using smmuv3 and iommu_platform enabling at virtio-gpu-pci) - Resolves: bz#1950405 (review qemu-kvm-core dependencies) - Resolves: bz#1967330 (Make qemu-kvm use versioned obsoletes for qemu-kvm-ma and qemu-kvm-rhev) - Resolves: bz#1976015 (spapr: Fix EEH capability issue on KVM guest for PCI passthru)- kvm-block-backend-add-drained_poll.patch [bz#1960137] - kvm-nbd-server-Use-drained-block-ops-to-quiesce-the-serv.patch [bz#1960137] - kvm-disable-CONFIG_USB_STORAGE_BOT.patch [bz#1866133] - kvm-doc-Fix-some-mistakes-in-the-SEV-documentation.patch [bz#1954750] - kvm-docs-Add-SEV-ES-documentation-to-amd-memory-encrypti.patch [bz#1954750] - kvm-docs-interop-firmware.json-Add-SEV-ES-support.patch [bz#1954750] - Resolves: bz#1960137 ([incremental backup] qemu-kvm hangs when Rebooting the VM during full backup) - Resolves: bz#1866133 (Disable usb-bot device in QEMU (unsupported)) - Resolves: bz#1954750 (firmware scheme for sev-es)- kvm-x86-Add-x86-rhel8.5-machine-types.patch [bz#1957838] - kvm-redhat-x86-Enable-kvm-asyncpf-int-by-default.patch [bz#1967603] - kvm-yank-Unregister-function-when-using-TLS-migration.patch [bz#1964326] - Resolves: bz#1957838 (8.5 machine types for x86) - Resolves: bz#1967603 (Enable interrupt based asynchronous page fault mechanism by default) - Resolves: bz#1964326 (Qemu core dump when do tls migration via tcp protocol)- kvm-pc-bios-s390-ccw-don-t-try-to-read-the-next-block-if.patch [bz#1965626] - kvm-redhat-Install-the-s390-netboot.img-that-we-ve-built.patch [bz#1966463] - kvm-sockets-update-SOCKET_ADDRESS_TYPE_FD-listen-2-backl.patch [bz#1967177] - kvm-target-i386-sev-add-support-to-query-the-attestation.patch [bz#1957022] - kvm-spapr-Don-t-hijack-current_machine-boot_order.patch [bz#1960119] - kvm-target-i386-Add-CPU-model-versions-supporting-xsaves.patch [bz#1942914] - kvm-spapr-Remove-stale-comment-about-power-saving-LPCR-b.patch [bz#1940731] - kvm-spapr-Set-LPCR-to-current-AIL-mode-when-starting-a-n.patch [bz#1940731] - Resolves: bz#1965626 (RHEL8.2 - QEMU BIOS fails to read stage2 loader (kvm)) - Resolves: bz#1966463 (Rebuild the s390-netboot.img for downstream instead of shipping the upstream image) - Resolves: bz#1967177 (QEMU 6.0.0 socket_get_fd() fails with the error "socket_get_fd: too many connections") - Resolves: bz#1957022 (SEV: Add support to query the attestation report) - Resolves: bz#1960119 ([regression]Failed to reset guest) - Resolves: bz#1942914 ([Hyper-V][RHEL8.4]Nested Hyper-V on KVM: On Intel CPU L1 2016 can not start with cpu model Skylake-Server-noTSX-IBRS or Skylake-Client-noTSX-IBRS) - Resolves: bz#1940731 ([ppc64le] Hotplug vcpu device hit call trace:[qemu output] KVM: unknown exit, hardware reason 7fff9ce87ed8)- kvm-virtio-net-failover-add-missing-remove_migration_sta.patch [bz#1953045] - kvm-hw-arm-virt-Add-8.5-machine-type.patch [bz#1957667] - kvm-hw-arm-virt-Disable-PL011-clock-migration-through-hw.patch [bz#1957667] - kvm-arm-virt-Register-highmem-and-gic-version-as-class-p.patch [bz#1957667] - kvm-virtio-blk-Fix-rollback-path-in-virtio_blk_data_plan.patch [bz#1927108] - kvm-virtio-blk-Configure-all-host-notifiers-in-a-single-.patch [bz#1927108] - kvm-virtio-scsi-Set-host-notifiers-and-callbacks-separat.patch [bz#1927108] - kvm-virtio-scsi-Configure-all-host-notifiers-in-a-single.patch [bz#1927108] - kvm-hw-arm-smmuv3-Another-range-invalidation-fix.patch [bz#1929720] - Resolves: bz#1953045 (qemu-kvm NULL pointer de-reference during migration at migrate_fd_connect ->...-> notifier_list_notify) - Resolves: bz#1957667 ([aarch64] Add 8.5 machine type) - Resolves: bz#1927108 (It's too slow to load scsi disk when use 384 vcpus) - Resolves: bz#1929720 ([aarch64] Handle vsmmuv3 IOTLB invalidation with non power of 2 size)- kvm-redhat-s390x-add-rhel-8.5.0-compat-machine.patch [bz#1951476] - kvm-redhat-add-missing-entries-in-hw_compat_rhel_8_4.patch [bz#1957834] - kvm-redhat-Define-pseries-rhel8.5.0-machine-type.patch [bz#1957834] - Resolves: bz#1951476 ([s390x] RHEL AV 8.5 new machine type for s390x) - Resolves: bz#1957834 ([ppc64le] RHEL AV 8.5 new machine type for ppc64le)- Rebase to qemu-kvm 6.0.015:6.0.0-33.el8s15:6.0.0-33.el8s.build-id9cbaab3d22fa1d543b79f872427c705d8262beeablock-ssh.so/usr/lib//usr/lib/.build-id//usr/lib/.build-id/9c//usr/lib64/qemu-kvm/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2aarch64-redhat-linux-gnudirectoryELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=9cbaab3d22fa1d543b79f872427c705d8262beea, strippedRRRRRRRR utf-81e83020ed733d9e91aee4fadf8953b0f4d8804fa34b304e103dcb079b569898a?07zXZ !#,/] b2u jӫ`(y-#bܗZQF d5Ȣˢy)M=Qwmq)U~v"~|TwZpQJӴ.$owA \2aZmuD,u?X`$wմ' e#%bm J .uGQZt"nM)˜%nc<߼V#w-_ ' GJp;{|/ >MTΛ> ˤ&/i[υf$83l$?D\`Ա\::jPORșʙ.e!maq>9vߛ\.ސ ) ?FOdEJ$PpH.g[ sP'5*H].b u]++4Ȕ'aH7IN>BGjM[.z"_/I_'h}ɋƾCȊçFN \یMlLS.پ_0I#U }!>TC;m5rVmfoK1Otfc04KP lnj10qW|15Wl9b Qn XJJas}C~F|#[}GVlLIΙ7DphUL#p?bY'P\[Ew_HbCR]E[-=!_&4B`kMfߌk]ݙ3lG$|w,dhqXi.tQ]e:CəAScHB,[Th0/@mçRY\&"iF!؜bz 3!zHWH=yEo^fi {"Ur=]e߄Bh- mifmJ ?S 0͒rb=Yӥ, IZUE%Tw/aɩs6M $iB= `; %[8Q'EH Jp+)^ϲJZ#ax}$ \5֘s@GrTٛ )Z y?@lL#P\J}䆵Nу-bPJw- a5SNa_hN 9cf17`c#P/Θ a. 5-[ ] 1ޮ1/L{b3)iϖMSB `b7M.2@k{&n~+ xWb̅Ir3v 5Onlw֖ q؋ Rݓ.;GJ,6rR.ˢwP6;/FZ qQG`$]TХwa#YX" 24kfQN߶#9 ^o:3PFl>̪P͆/r, \`Olnwf.+MީoA2+^ @,"YWA4f~b@>ǶԖ^T^ܠC=KY3/mssVSVɓVߏAmKCqH#mCAC$1S^i,e#*hbb|C24˩ w_lum&ƀ.ٺi?̈́82`l}ouIS/v}ERVqrv0:[8 73c%}rcTfMPs}tǒԳ 8p2}e)H0 `((L)ل}8&um'=t UN1@{U^/qijJXԪ|j{O, "& ~:5ʲR؇€p6,$ &a ɱ\;CLC;pQYaFl.qUsc4k63oՎ)L+#v3wnOʊ&N *[E-)6&}I,vVn|WJ.  w!x𙴗کr鱓OzJqlM~ Jȑ6#[.|(ԫkkr841A$D~: t֓%-!X\~|D["SJr4egژL؎8*+ɣ&*ggV"V5f*Jo(((珛-0 T:F"h3:rLW^CԙC7\xu@Mjvg[׉|U~ەVB'#qI.1t4WfWͷKTP<,^ ô4PeL㖜 ^| 8>tP-ĸrGGxETq4ERDP]Rg7)@xUi xǺDfkImGr߾u5uLo4}CGv 3@VV PaȆxy"&y4;EY59Q[(:EUvr2yj%E=ݍm%l ȴO|S.y &+>`- ʔֹWP->76 Y^PĦpW,b?YjG߿Fr;,hi^P&h)xe2g^JS{|Usd4/?m[:_i]"׷lH&#h(;P (VPrAP1i*ɛqNK.*}54>l=g2q.N_3ȗxJXcoF>Yd%| E@id[oZJMznWm̒T|o>ќJ} q< 3lDInq玖GQhs+Z V<@X#Ţs0>GAdZig⪥c1W˹M=~-n}pQhe8nM?ѡ ιظgmwmmQỹs RFlfA 4`U n1&>D Y %<}~COyK{TW #|V DPuwMYNn˜Vvs/ }D<%e ;KV] c"5P(dIp`ab0 i5l꒓P){tjCה ^ؾ4ڝ,l*BK XU#䀢 lg;2-N`Ⱥ+WP6-ǔUԪ#CZ/PM`N & |l7caMy'A9ؽV⫋`T Sg*C♔*me^W Ɉ^&0R\s厥fV .%_r&Ij(C綒2D,+`ӫ 0bTEO7C81>uSuS|2?o|З͸T|d]pJG5e· muI~3eOdh!Ws ti4B|uf8s~^׎4Qڡ"J^g!;(Lƥ))|V0@>džUuZfqxmGRU|+Տhm8pۀ zL_=m;޺E2'+?`t|FmݹD5G;.919[ N#4JOq\9|i x|s(%-pZT2#[F&$Ze|> u知kVVaDӷӒk4SXHC&b c׏Q-jo7Ux@"WےбiZ,̟(SDd8:\445`Z w,;)sUa p}u1;R^gʶs\&(eߠhp{囇 Ni 3KY'X@|<,T͂7#@,@8 1"_ hHĥp8i(2&+ T0(F# n̢aĜ%QUVLj\-8 դy "H{?Og OhͺM^ӭuei1, c O0chR?UI rn=f!)oj "jjeE@/>0H:L*Ij:}]YzNZ%4 T4|OMu A$ӖhxN`IJKtNy7:c^>[l KD&5<@B7i`oDNsɊ'Z\<6KYԝ._  x$M=A 6;X8NcLr4) 渐f]9Lm/08a| 1/ϴcc O}ʑppT ]iՕKZ|N_A| }gG@rnde,n3{cȤ=9bgI թ 9Vr!hh!w Sr.$D+r8"3'mƘ-" J(.UԹjRIX ' ^eA'l:a/GC^g*yJ5{ &cb[ n;_2iT)Dc)Ƴgk[YVƗ0ribGLv,)}\5w qfB%EQ?׊? &/EKҪ)#eiYe!"bf~ə4(܆E/Nݒӄ8cO~t}]~~gs!E #,~lF%2ۙcjCa*r#cnZ=v炃8^Őm#Y>e`Zoj @e#7xgLVMlRuwPUVW/Xɫo{FB<̊C/4M:ފϏdjw,VROTetƬophxvt`2ƚZ_XP,)Nդ1*RUBNrfv׬D uMF[RU]=rR=8UK=M,._ǁ`W\ tUYA"o :~edh.{Q]YԮ ~>t1rW69rLO,'>t*ⲃu1`_e5/TY\&΅O]Ֆu7js qD8[P=À pIcq Ri1_7. Y#t?Z:?x(aG, ۿ퓂Qe*r2j\ͅF~_$(YMo lӜ _AQh?\ qp'dF5z [}hvV.k}y pC,GqR[ZVCv~$%ԉ:QHb$_֙j١≥Dbg=rjv%s:ExSjݶܳ\vqr?͖Oї Mq )@J8~FbMO1Ud0RlhigBI3WO?퉛[a ļ>o]n1Vf`ALvsa4]ӢdU|<=x)\ZT @?8C? NJ`YR}% rN@rIӶ<; Tp|Tث/6es:2;>7s`e̮$|m؀I$dtrPt*F٣T'&= ~~s6 @#KǚbNΎp~'Ɠ Dr/OR *+ я SozȋJh8\0}iHJw77^l9j 5ڦuh_!kRRRN@UǬRm)}_OPގ( r7$:3MppqiMwACVE݅LQ@TI jCܤ97ۙXR!gl*<;"pux! j׉wq8k+YbB!^ QQ<9~nA}@T$Xfq>Q y0K\Jܵ+{Z#qBjkyT'=C2{G3 aHL~Rd"L [Qk Y>)am}#Q&7'bHȟDpe͢^7 {c:Αs-2XS$+S!vJαiwhk{+ 2*U#@v`iGِWV&QujPEj~(mo\_yTB<XḉXvO*l7*5آ gɤ\(9ƄT=38Ox$@iD{zXhr!^XR,;N,Mm{Ez65I0dUN7Knĕ+Iey?Um"]ҒkT !DK/ġ \[(k:Vh4[ǜapC$KW`q!ÉBXpa"ak4"5.kz%x_ҧ^$ה++Kb0ڻw{>d1b>uaRʲ,lVs = {AHw*'> .,ʡd5\crH) K'2 U$55 )N,;'ߣ[~:L3-LEJEЏ6q.DH~%W9xRĤkBXZ(Yў⺟(1k2푻ߙBs$r 0tzR Ѫ,<'(tM0_̗Z*Q:%O8NQFzKf}#-ZnZL\|O;RAiz aXMoZ=23iBwR熳1Kq|IN9!,ye p&сѲ{2)H(}Jq%7_5[5b$uOXiT6$-3KjOZ,yMe;Q%fwRWryVuffpR~:&&FJahAa('!ՔO(?>5/zr* z|.G0E`TwAY,l]vT.:_E&qG"{cq議߫6G5f+h YYhQܛ- {Xul/2(jEM$6Q )vx*o&yyT2ᴬL,pP"b+75n{\AGmi״/Pbb$_VX=/7~%,?Pv&|ce,]3+ېaBD_` ;H$2"' &/t͋3< x.|ozUGgR 7rQy\7ZH 9 oNn%w\anIǐ+ş<{׾kҗu&1jwJ$4.z3J-$sFFv9iC$_qq@$Nlي'$P E穅HN `.{:U2oM>3)IjS@lA.%4*\RnLRz9[Z3] Pxr#mlUZϯ RMTHM{NOGޅs~4|bvw1 [%sņy>_'ry@ @2-ZeNETmsngÔLk$/oݲr2L.M:]k|4ku聹*#ijoK$ C;-x+{־m ܸKua( o|vǚdҍkh[koԺz-}*)qX!.!6uVѲ]8-`Q&WGQBd cВyKr~x%dz/oVUKgޛa .;onQg_% {޸'htț*dokİL\#L!x! @G2<+u+13J3YG? <iX;h^0v #̽vQBاk /##"w[׮t5+0@\eэΡ OM>ՠ\|g@-(_ǝG@JG[C=QnICoP((/|p]9D!<3 C+ak^gL@Cv 8+'Kk׮0_efu lø=  sM8A}p‚'NL} cüs$`"Rmt5A(6LD|5J&J.r SMfǝ4v\腞k=~ޔij]Äa `u]ۧA 2]_%˱g]d?*D4aޥLvB eB̽Ek1zˬ'yߞ/m'n-:6[5KXFq(51[;7b=)GxwZax'd)|}iʧ\&DHʯFUV6 fiļrCS]o禣W} 9'TDqyǜYO;4ߘ%A:bϐguK=CJ{N"}F-N]z(~B/fw̜UUtl#Ze̚-L(f1'z*Ds-4I9q@"ֱE3X6|7HVJ :+yo(^hmSwX@79{MGwe *b}Yۈyꗧ9 DQ KGCzaVaV!Mƀeq7Br"y`>.D'IV*cEՉz9sQ9zWȗ$ijePq#$I"R48U5Wwf+C͛uN@ꚸ .7y4ETYz5[Ei鏗qWa7-1PUfE|So/?3;T%? #G8t@Z pНv%5e0]=t>ֳvf/+/2'IXPRĶl&\:Z䓕, ؟BۣH蟉InG.== a1pXu,!ݛi2#ySxX-Ev?#qNUxy`c3D$j7Pb+3cvs'8Nr2Í^Gv èdVOtۖSK?^iྲྀ YZ